Skip to main content

How To Hack Wifi Password Using Kali Linux



Hello Friends! Today in this tutorial we’re going to discuss “how to hack wifi password using Kali Linux”. I generally use the Bruteforce attack to crack Wi-Fi password. In this attack, we make a monitor mode in the air by some commands that capture Wi-Fi password in the hash form.

After capturing that hash form password we need to download a wordlist file, you can get it, by

clicking here  . This list contains so many simple passwords. After doing this we use aircrack-ng tool to match the hashes of capture file with the password list. Once it finds a match, it will show you the correct password.


 ALSO READ:- How to hack android phone using Kali Linux?


BruteForce Attack

It is an attack in which an attacker create a password list which is full of common passwords. There is a tool present in Kali called aircrack-ng which try each and every password present in the wordlist very fast.

Start by downloading a wordlist. This will help you later. Let’s begin, open up your terminal and type

airmon-ng 

It will show you the present wireless cards attached to your system for Wi-Fi.

After this, type


airmon-ng start wlan0 

This command will start the monitor mode which is then used to capture the Wi-Fi password.

how to hack wifi password using kali linux

Then, type

airodump-ng wlan0mon

It will show you available Wi-Fi networks present around you.

dump available networks

Press ctrl+c to stop this. Now, type


airodump-ng -c ‘channel no.’ –bssid ‘ssid of the Wi-Fi which you want to hack’ -w /root/Desktop/ wlan0mon

So, this airodump-ng command captures the information of the Wi-Fi and then type channel no. to give it the information about the router on which we have to perform this attack. Similarly, I give ssid to airodump and then I type -w which shows the location in which I have to save the captured files. So, I saved captured files to Desktop and then I typed Wireless interface name.

dump details of that router

It starts showing you the available connected devices to that network then simply open a new terminal and type

aireplay-ng -0 0 -a ‘ssid of the router’ -c ‘ssid of client’ wlan0mon

That’s the command to send unauthenticated packets to the router.


disconnecting devices connected through router

It will disconnect all the devices which are connected to that router. Once it accomplishes its task. Then disconnected devices will send a request to the router for reconnection to the router. At last, we type this command and it will disconnect all the devices from the victim’s router.

When a device sends the packet to reconnect, your monitor mode will capture the password. While it captures the password, in the first terminal window you see at the top right corner there is a handshake present.

shows handshake is done successfully

But the problem is that the password is in the hash form. We have to decrypt it. So, there are so many methods to decrypt the password. I will discuss all of that in the upcoming posts; so stay tuned.

But here I will show you how to decrypt this password by the BruteForce attack only. So, here I use aircrack-ng which apply every password of the wordlist to the victim’s router silently. Simply, type

aircrack-ng -a2 -b ‘router’s ssid’ -w /root/downloads/’wordlistfilename.txt’ /root/desktop/*.cap. 



cracking password using aircrack

You see here my attack is complete and I got the password key of the victim’s router.

shows that password is found

So, I hope now you have learned how to hack wifi using pc/how to hack wifi using cmd. In the upcoming posts, we will learn much more than this. If you have any doubts regarding any post then you can ask us by posting comment. 🙂


Comments

Popular posts from this blog

Hacking Simulator | Geek Prank Hacker Typer Online

Hacking Simulator Do you love the sight from a movie where a masked man sitting in a dark keep hitting the keys on the keyboard and eventually ends up hacking certain organizations’ databases? So, you also want to do that in real life but not sure about how you are going to get your hands-on hacking because Hacking is something that is seen as an illegal practice. So, the developers come up with the idea of “ Hacking Simulator ” that solves all the problems related to legitimacy while practicing hacking in real life. Hacking Simulator can be used by the people who are just practicing hacking for fun and by the  professional hackers  too for continuously practicing and upgrading their skills. Hacking Simulator Online Hack the box: HTB is an online platform for hackers across the globe to test their penetration testing knowledge and It provides the user with the platform as well as resources to test their hacking and penetration testing tools. It has over 276k+ users on its plat...

What Is Vishing Attack? How To Prevent Vishing? Brief Guide

Vishing Hello Guys! Today we are going to learn about a very interesting term that is  vishing  that is also known as ‘ Phishing over Voice Call ‘. There are both pros and cons of the digital era we are living in. Peoples are using this technology which indicates their second identity. So, it’s very important to stay safe there also.  We  Hacking Blogs  are here to help you with the black hat hackers. We want our readers to stay safe online. We have discussed the  Phishing Attacks ,  Smishing Attacks , How hackers are able to hack your Instagram Account and many more. You can find interesting posts by  clicking here . But today we want to introduce with a very common attack that is Vishing. This is a very common attack almost everyone knows about this. What Is Vishing Attack? Vishing is made up of two words “ Voice Call ” and “ Phishing “. This is completely a Social Engineering attack. In this, Black Hat Attacker calls to the victim’s device and ...

OSINT tutorial to Find Information from a Phone Number – PhoneInfoga Tool

phone number plays a vital role in the social engineering and the open source intelligence investigation. Everyone carry’s phone, the  phone is now linked with an individual life and it has the most important information of a person. In the  OSINT investigation , we need to find-out the line type, carrier, location and other relevant information about the subject’s phone number. The number itself shows some information like country, city (landline pattern) and sometimes carrier; while the other information can be extracted by using the open platform available.   This tutorial is about PhoneInfoga, as the  official doc  says: “PHONEINFOGA IS ONE OF THE MOST ADVANCED TOOLS TO SCAN PHONE NUMBERS USING ONLY FREE RESOURCES. THE GOAL IS TO FIRST GATHER STANDARD INFORMATION SUCH AS COUNTRY, AREA, CARRIER AND LINE TYPE ON ANY INTERNATIONAL PHONE NUMBERS WITH A VERY GOOD ACCURACY. THEN SEARCH FOR FOOTPRINTS ON SEARCH ENGINES TO TRY TO FIND THE VOIP PR...